03646nam 22008055 450 991072838580332120251225205339.09783031334917303133491410.1007/978-3-031-33491-7(MiAaPQ)EBC30553130(Au-PeEL)EBL30553130(OCoLC)1380721834(DE-He213)978-3-031-33491-7(BIP)091206239(PPN)270612408(CKB)26784648200041(EXLCZ)992678464820004120230527d2023 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierApplied Cryptography and Network Security 21st International Conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023, Proceedings, Part II /edited by Mehdi Tibouchi, XiaoFeng Wang1st ed. 2023.Cham :Springer Nature Switzerland :Imprint: Springer,2023.1 online resource (735 pages)Lecture Notes in Computer Science,1611-3349 ;13906Print version: Tibouchi, Mehdi Applied Cryptography and Network Security Cham : Springer,c2023 9783031334900 Includes bibliographical references and index.Embedded security -- Privacy-preserving protocols -- Isogeny-based cryptography -- Encryption -- Advanced primitives -- Multiparty computation -- Blockchain.The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023. The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows: Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes. Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain. .Lecture Notes in Computer Science,1611-3349 ;13906Data protectionData structures (Computer science)Information theoryOperating systems (Computers)Application softwareCryptographyData encryption (Computer science)Data and Information SecurityData Structures and Information TheoryOperating SystemsComputer and Information Systems ApplicationsCryptologySecurity ServicesData protection.Data structures (Computer science)Information theory.Operating systems (Computers)Application software.Cryptography.Data encryption (Computer science)Data and Information Security.Data Structures and Information Theory.Operating Systems.Computer and Information Systems Applications.Cryptology.Security Services.005.8005.8Tibouchi MehdiMiAaPQMiAaPQMiAaPQBOOK9910728385803321Applied Cryptography and Network Security771881UNINA